Alternative protocols for femtocell backbone security.
Tomas VanekMatej RohlikPublished in: WMNC (2011)
Keyphrases
- security protocols
- key agreement protocol
- security properties
- cryptographic protocols
- authentication protocol
- key exchange
- communication protocols
- information security
- security issues
- key distribution
- security requirements
- access control
- application level
- security analysis
- security threats
- security mechanisms
- key establishment
- security services
- secure multiparty computation
- security systems
- security policies
- intrusion detection
- security problems
- cyber security
- network management
- mutual authentication
- network security